Company Phone Number

877-332-3250

Open Source Solutions

Which AV to Choose?

Each of the endpoint security solutions sold and supported by ICE Systems was carefullly selected becuase it can provide effective protection for our customers.

The criteria for inclusion in our list is based on a combination of internal testing, qualified independent research and technical feedback. More info ...

While all these brands are capable, each posses strenths in specific areas. Some features, functionality or behavior may be of greater importance to certain users. With this in mind, we would like to offer some general guidelines for selecting the right product for your company.

Under each product logo you will find some bulleted items that designate the key strengths of the software. We have focused on attributes such as detection rates, centralized management, resource utilization and value / pricing.

  • Excellent Detection Rates
  • Excellent Centralized Management
  • Ransomware Protection & Remediation
  • Scalable to Large Installations
  • Unique Virtualization Technology
  • Device Control
  • Encryption
  • Application Whitelisting/Program Control

  • Excellent Detection Rates
  • Strong Centralized Management
  • ATC / IDS Ransomware Defense
  • Cloud Support
  • Scalable to Large Installations
  • Device Control
  • Support for Virtualized Infrastructure
  • Offload Scanning Option

  • Good detection Rates
  • Excellent Centralized Management
  • Cloud edition available
  • Intercept X Advanced Protecion
  • Deep Integration w/Perimeter Defense
  • Device Control
  • Data Encryption
  • DLP

  • True Next-Gen Protection
  • Dynamic Malware & Exploit Detection
  • Pre-excution Defense, White / Blacklisting
  • Mitigation and Remediation capabilties
  • Real-time Forensic Analysis
  • Strong Centralized Mangement
  • Lightweight Autonomous Agent

  • Excellent Detection Rates
  • Good Centralized Management
  • Small Fooprint, low resource utilization
  • Modular Product Offering (AV-only or Suite)

   

  • Good detection Rates
  • Extremely Light and Fast
  • True Cloud-Based Implementation
  • Agressive pricing

  • Specilized, Atypical Threat Detection
  • Run Alonside Standard AV Product
  • Small Fooprint, low resource utilization
  • Active and Passive (on demand) Editions

 

Watchdog Development

  • Specilized, Atypical Threat Detection
  • Best Antimalware Dectection and Remediation
  • Cloud-based scanning and analysis
  • Multiple engine implementation

  • Excellent Detection Rates
  • Good Centralized Management
  • Light fooprint, low resource utilization
  • Outstanding Pricing for EDU / GOV